@inbook{382d2650f1ca49b98eb8e06770f1606f,
title = "Data Leakage/Misuse Scenarios",
abstract = "Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.",
keywords = "Leak Incidence, Honeypot, Unintentional Cases, Third-party Location, Unintentional Leakage",
author = "Asaf Shabtai and Yuval Elovici and Lior Rokach",
note = "Publisher Copyright: {\textcopyright} 2012, The Author(s).",
year = "2012",
month = jan,
day = "1",
doi = "10.1007/978-1-4614-2053-8_5",
language = "English",
isbn = "978-1-4614-2052-1",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
number = "9781461420521",
pages = "39--46",
booktitle = "SpringerBriefs in Computer Science",
address = "Germany",
}